General

  • Target

    44553c7bed716512cca7014f9d898e0f852abab864901ea9a8f220823fac2b01

  • Size

    72KB

  • MD5

    b1ca7cf1230f66434a210e5540730873

  • SHA1

    2abad972a9db7fa78517f7e30dfc70b7b86268f4

  • SHA256

    44553c7bed716512cca7014f9d898e0f852abab864901ea9a8f220823fac2b01

  • SHA512

    5bab4d33703e3e24b68c276aed0520195727987c1dffbf6d19a245f164bc14060daf01312a8be9996416323cd5acf952fc30418a553d6161695acd2567cd2f33

  • SSDEEP

    1536:b+3AXU+2ULULo0IsHKQBvMEhnLaDk2vTLWzfL9kCGgL3SaUIjPDHIVhyE3GVKbBV:b+QXUVULULXI7QBvMEJLm/bW9TUIjPDA

Malware Config

Signatures

  • Detect Mirai Payload 1 IoCs
  • Detected Gafgyt Variant 1 IoCs
  • Detected x86corona Mirai Variant 1 IoCs

    File resembles variant of the Mirai bot which was first seen in early 2020.

  • Gafgyt family
  • Mirai family
  • Mirai_x86corona family

Files

  • 44553c7bed716512cca7014f9d898e0f852abab864901ea9a8f220823fac2b01
    .elf linux x86